Do it now activity Understand the purpose of the Data Protection Act Understand the purpose and some techniques of database data security What rights do.

Slides:



Advertisements
Similar presentations
MySQL Installation Guide. MySQL Downloading MySQL Installer.
Advertisements

With Microsoft Excel 2007 Comprehensive 1e© 2008 Pearson Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Excel 2007 Comprehensive.
XenClient Enterprise 4.5 Network Bandwidth Policies.
Millennium Scheduler. 2 Scheduler How to find “Scheduler” Overview Making a task Making a schedule Bugs ________________________________________ More.
Compe 341 Oracle Installation Procedure. Oracle From Click.
Database Systems. What is a database? A database is an organised store of data items.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
Types of Number – Squares, Cubes and their Roots
ONLINE DATA STORAGE & DOCUMENTS Lesson 3. Lesson 3 – Online documents In this lesson we will be covering:  Online documents  Compression and expansion.
Word Processing Software
East Aurora Website Setup Mrs. Harty Teacher Webpage Index: Click Picture for Examples Mrs. Harty Summer 2011 District 131 Step Nine: Downloads.
REFWORKS (WRITE-N-CITE): Write-n-Cite allows one to write a paper in MS Word, and to insert citation placeholders directly from one’s references imported.
Databases Setting up a Database.
There are lots of wikis out there… But I like…. A how-to for the classroom.
Search on the internet the different ways for building a website, and choose which one bests suits you for what website you are doing.
Activity 1 Input Device Output Device CPU RAM Hard Drive (Hard Disk)
Databases Lesson 1. Anagrams S E A A D T B A D I F E L C R O D E R N O I T A I L D A V.
Execute Workflow. Home page To execute a workflow navigate to My Workflows Page.
My Documents MarysWebpage 1-WebpageFolders&Files Projects&Assignments MySpinPage SciFairProjPage The folders you should have in “My Documents” are shown.
Instructional Technology & Design Office or Box at U of I: Cloud Services Presented by Kate Rojas.
The Glance Project ATLAS Management January 2012.
6fb52297e004844aa81be d50cc3545bc Hashing!. Hashing  Group Activity 1:  Take the message you were given, and create your own version of hashing.  You.
Creating a backup file Downloading a backup file Uploading a backup file Resetting or restoring your course from a backup file.
The Functions of Operating Systems Desktop PC Operating Systems.
YEAR 8 – WEB DESIGN IN HTML Lesson 2. STARTER Use the internet to find out what JavaScript is? Use ‘Microsoft Word’ to write down your list.
6th September 2012 PROPOSAL APPLICATION CORE 2012 CALL.
How to make and publish a web page. Create a folder.
Advertising 1 *The red circles show the position of the keyframes on the timeline. What are banner and pop-up advertisements? 1 Answer Banner and pop-up.
The Report Generator Viewing Student Outcomes. Install the Report Generator In a browser, go to Click.
IT 606 Computer Networks (CN). 1.Evolution of Computer Networks & Application Layer. 2.Transport Layer & Network Layer. 3.Routing & Data link Layer. 4.Physical.
Visual Basic for Application - Microsoft Access 2003 Finishing the application.
YEAR 8 – WEB DESIGN IN HTML Lesson 3. STARTER Use the internet to find out what A hyperlink is used for? Use ‘Microsoft Word’ to write down your answer.
Copy of the from the secure website - click on the AccoridaLife.zip link.
Lesson 29: Building a Database. Learning Objectives After studying this lesson, you will be able to:  Identify key database design techniques  Open.
Networks. Learning Objectives: By the end of this lesson you should be able to:
 Collect your past paper  Collect a starter sheet – do it as your computer is logging on.
The Really Basic Computer Quiz Question 1 Which drive should you use to save your work?
DMBS Internals I February 24 th, What Should a DBMS Do? Store large amounts of data Process queries efficiently Allow multiple users to access the.
DMBS Internals I. What Should a DBMS Do? Store large amounts of data Process queries efficiently Allow multiple users to access the database concurrently.
9NL Ayomi Hasenclever.  You cant touch a software  It is stored in a computer or laptop  Allows the hardware to do something useful, without the software.
UNCLASSIFIED 1 UNITED IN SERVICE TO OUR NATION Manage Enclosure Documents for Requirements Package.
POS 420 Week 2 DQ 2 Resources: SkillSoft (2012). Working with UNIX Files and Directories. Complete navigate a filesystem, create a file, and set permissions.
3.6 Fundamentals of cyber security
Eform Generator.
Database Database is a large collection of related data that can be stored, generally describes activities of an organization. An organised collection.
Loading a File to the UST Web Server
Discover More.
Database Splitters.
Mary Torjussen A2 ICT Week 1.
Digital Technologies Lesson Yrs 5/6
Do it now activity Since the beginning of the term you have planned a database based on your own scenario. Using your plan you are going to create a database,
Data Representation.
ESS VIP ICT Project Mapping Assistant in use (ICT domain)
STEP 1 STEP 2 ENTER YOUR USER ID & PASSWORD
UNIT R001: Understanding Computer Systems
Figure 6-9: Managing Users and Groups
Information Technology Ms. Abeer Helwa
HTML and CSS eportfolio
Communications & Computer Networks Resource Notes - Introduction
III. Responsibilities of Admin
Types of Computers.
Do it now activity Go to: ASandA2ict.weebly.com
Understand the purpose of normalisation in terms of reducing duplication of data  Understand the purpose of Primary and Secondary Keys in a Database  Learning.
Warm-Up #3
What do you think is different between these two images?
Completing Connectivity Questions
Completing Connectivity Questions
Typing.com Searching Scenario Typing Test
Lesson 3.3 Writing functions.
Presentation transcript:

Do it now activity Understand the purpose of the Data Protection Act Understand the purpose and some techniques of database data security What rights do you have under the data protection act? Scenario Functional Specification Data protection Act Password Data security Speed Space

New learning Go to: ASandA2ict.weebly.com Click on A2 and then Unit 7 – Lesson 2 Follow the links under The Data Protection Act and read the webpages Understand the purpose of the Data Protection Act Understand the purpose and some techniques of database data security Scenario Functional Specification Data protection Act Password Data security Speed Space

Talk Task How might the data protection act apply to our scenario? Why must data be deleted after students leave the school? Understand the purpose of the Data Protection Act Understand the purpose and some techniques of database data security Scenario Functional Specification Data protection Act Password Data security Speed Space

Learning Development How can data be protected? Understand the purpose of the Data Protection Act Understand the purpose and some techniques of database data security Scenario Functional Specification Data protection Act Password Data security Password certain database objects ( e.g. tables, reports, forms could be password protected) Profiles/access rights– different access rights / permissions given to different users (read only, read/write) Switchboards/user interfaces/menus – different users can see different forms, different versions load for different users Speed Space

Learning Development Reasons for deleting data Understand the purpose of the Data Protection Act Understand the purpose and some techniques of database data security Scenario Functional Specification Data protection Act Password Data security Speed Space Reason for example: Explanation SpaceIf data is not deleted the database file could be a lot bigger than it needs to be SpeedA larger database file would lead to slower processing DPALegally can only keep data for certain lengths of time

Independent Task Scenario Functional Specification Input Output Process Speed Space Go to: ASandA2ict.weebly.com Click on A2 and then Unit 7 – Lesson 2 Download, save and then complete Lesson 2 Activities Worksheet Understand the purpose of the Data Protection Act Understand the purpose and some techniques of database data security

Plenary Scenario Functional Specification Input Output Process Speed Space Upload your activities worksheet to Edmodo Homework – Due Wed 22 nd January 2014 Complete Activity 1 for your chosen scenario and upload to Edmodo Understand the purpose of the Data Protection Act Understand the purpose and some techniques of database data security

Scenario Functional Specification Data protection Act Password Data security Speed Space MB1 (with help) Identify how the data protection act would apply to a given scenario Identify ways of protecting data in a database MB2 (with pointers) MB3 (independently) Understand the purpose of the Data Protection Act Understand the purpose and some techniques of database data security